Remove 11
Remove 2020 Remove Events Remove Privacy Remove Security Remove Video
article thumbnail

China Issues Provisions on the “Scope of Necessary Personal Information Required for Common Types of Mobile Internet Applications”

Hunton Privacy

The Provisions generally are consistent with the draft version previously issued for public comments on December 1, 2020 and include additional details, as well as new provisions relating to ticketing applications ( e.g. , those for purchasing seats at performances).

article thumbnail

If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (important guest post)

Architect Security

But police and sheriffs’ departments who want to surveil protests in their area do have a mind-boggling array of resources at their disposal in the year 2020. They have easy access to social media messages, as well as social media photo and video footage and its associated metadata, and data downloaded from confiscated phones.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption. Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared. 2020, p 6).

article thumbnail

Top Cybersecurity Companies for 2021

eSecurity Planet

As the demand for robust security defense grows by the day, the market for cybersecurity technology has exploded, as well as the number of available solutions. Syxsense Secure. Stop breaches with one endpoint security solution. Pre-built templates keep organizations secure without needing large teams and specialists.

article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

After 11 months of a very intensive process culminating in many months of exclusivity with a party I believed would ultimately be the purchaser of the service, unexpected changes to their business model made the deal infeasible. of the company. It was an endless series of questions, meetings and if I'm honest, frustration.

IT 133